Elliptic curve exponentiation apparatus that can counter differential fault attack, and information security apparatus
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
first embodiment
1. First Embodiment
[0051]The following describes a point issuing system 10 as a first embodiment of the present invention.
1.1 Construction of the Point Issuing System 10
[0052]The point issuing system 10 is roughly composed of an IC card 100 and a point issuing apparatus 200 as shown in FIG. 1.
[0053]The IC card 100 is loaded in the point issuing apparatus 200 by the user of the point issuing apparatus 200, so that the point issuing apparatus 200 generates points, encrypts the generated points, and transmits the encrypted points to the IC card 100. Here, the points are “bonus information” provided from the seller or the service provider to the user when the user purchases a commodity or uses service. For next commodity purchase or service use, the user can use the points as part of all of its payment to the seller or the service provider.
[0054]The IC card 100 receives the encrypted points, decrypts the encrypted points to obtain decrypted points, and internally stores the decrypted po...
second embodiment
4. Second Embodiment
[0143]The following describes a digital signature system (not shown) as a second embodiment of the present invention.
[0144]The digital signature system is roughly composed of a user A apparatus, a user B apparatus, and a management center apparatus (all not shown). The user A apparatus, the user B apparatus, and the management center apparatus are connected to one another via the Internet. The user A apparatus, the user B apparatus, and the management center apparatus are each specifically a computer system including a microprocessor, a ROM, a RAM, a hard disk unit, a display unit, a keyboard, and a mouse. A computer program is stored in the RAM or the hard disk unit. The functions of each of the user A apparatus, the user B apparatus, and the management center apparatus are realized by the microprocessor operating in accordance with the computer program.
[0145]The user A apparatus sends a message, together with digital signature data, to the user B apparatus. The...
third embodiment
5. Third Embodiment
[0158]The following describes a key sharing system (not shown) as a third embodiment of the present invention.
[0159]The key sharing system is roughly composed of a user A apparatus, a user B apparatus, and a management center apparatus (all not shown). The user A apparatus, the user B apparatus, and the management center apparatus are connected to one another via the Internet. The user A apparatus, the user B apparatus, and the management center apparatus are each specifically a computer system including a microprocessor, a ROM, and a RAM. The functions of each of the user A apparatus, the user B apparatus, and the management center apparatus are realized by the microprocessor operating in accordance with a computer program stored in the ROM or the RAM.
[0160]The user A apparatus and the user B apparatus each obtain the same shared key, without revealing the key to third parties.
[0161]The user A apparatus, the user B apparatus, and the management center apparatus e...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com